Search
Selected: S

Securing a mobile adhoc network from routing attacks through the application of genetic algorithm

Computer Science – Networking and Internet Architecture
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Securing AODV for MANETs using Message Digest with Secret Key

Computer Science – Networking and Internet Architecture
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Securing data transfer in the cloud through introducing identification packet and UDT-authentication option field: a characterization

Computer Science – Networking and Internet Architecture
Scientific paper

  [ 5.00 ] – superior Voters 1   Comments 1

Securing Internet Protocol (IP) Storage: A Case Study

Computer Science – Networking and Internet Architecture
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Security Enhancement With Optimal QOS Using EAP-AKA In Hybrid Coupled 3G-WLAN Convergence Network

Computer Science – Networking and Internet Architecture
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Security Implications of Converged Networks and Protecting Them, without Compromising Efficiency

Computer Science – Networking and Internet Architecture
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Security in Carrier Class Server Applications for All-IP Networks

Computer Science – Networking and Internet Architecture
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Security in Wireless Sensor Networks: Issues and Challenges

Computer Science – Networking and Internet Architecture
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Security Issues in the Optimized Link State Routing Protocol Version 2 (OLSRV2)

Computer Science – Networking and Internet Architecture
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Security Visualization for peer-to-peer resource sharing applications

Computer Science – Networking and Internet Architecture
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Security-Performance Tradeoffs of Inheritance based Key Predistribution for Wireless Sensor Networks

Computer Science – Networking and Internet Architecture
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Selective data collection in vehicular networks for traffic control applications

Computer Science – Networking and Internet Architecture
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Selective Multipath Interference Canceller with Linear Equalization for DS-UWB Systems with Low Spreading Factor

Computer Science – Networking and Internet Architecture
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Self-* overload control for distributed web systems

Computer Science – Networking and Internet Architecture
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Self-adaptive congestion control for multi-class intermittent connections in a communication network

Computer Science – Networking and Internet Architecture
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Self-adaptive web intrusion detection system

Computer Science – Networking and Internet Architecture
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Self-Adjusting Networks to Minimize Expected Path Length

Computer Science – Networking and Internet Architecture
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Self-optimized Coverage Coordination in Femtocell Networks

Computer Science – Networking and Internet Architecture
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Self-organization of Nodes using Bio-Inspired Techniques for Achieving Small World Properties

Computer Science – Networking and Internet Architecture
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Self-Organization of Wireless Ad Hoc Networks as Small Worlds Using Long Range Directional Beams

Computer Science – Networking and Internet Architecture
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.